February 23, 2015 By Jason Hardy 2 min read

What would you say if I told you the total number of mobile devices in use is greater than the world’s population? There are an estimated 7.3 billion mobile devices in service for the 7 billion people in the world. Although that may seem impossible, look no further than your own home — the typical family has more than one device per person. Between laptops, smartphones and tablets, it seems everyone always has a mobile device within reach. In fact, these items have become so ubiquitous that we take exception to any situation or environment that does not accommodate us and our devices.

The Convenience of Mobile, But at What Risk?

We are so comfortable with our devices and the simplicity they bring to our lives that most of us don’t even think about the security issues that come with them. We store contact information for everyone we know, our favorite music, personal photos, appointments for ourselves and our kids, where we bank and shop and even our upcoming travel plans. Mobile devices know nearly everything about us. Virtually all our private information now lives inside a device that fits in our pocket and, unfortunately, could be easily become lost or stolen. Many of us have simply decided the convenience of taking everything we need everywhere we go is worth the risk of it ending up in the wrong hands.

Most of us assume our data is safe. Our phone locks and all the apps we install presumably have native security measures, too. However, are we assuming too much? Maybe so, according to recent IBM research on seemingly innocuous online dating applications. According to the study, there are security gaps in many dating apps that could be exploited to gain access to content on devices. While the study focused on dating apps, any of the apps we download and trust could be the opening cybercriminals need in order to gather sensitive information or deploy malware.

Boosting Your Mobile Security

IBM has designated four pillars of mobile security — device, content, application and transaction — and provides solutions to protect every pillar.

With IBM MaaS360 as the centerpiece of the IBM Mobile Security portfolio, companies can start with a solid foundation that secures the device, its data and its applications. Mobile Threat Management™ remediates mobile risks, including malware, suspicious system configurations and compromised devices, delivering a new layer of security for enterprise mobility management.

In today’s digital economy, the impact of the cloud, mobile, DevOps and security on business is pervasive. If you want to learn more, join IBM this week in Las Vegas at IBM InterConnect 2015 or participate remotely via InterConnectGO. Mobile security will be represented in the Mobile Enterprise section of InterConnect and within the Mobile Stream. Visit Booth No. 520 to participate in interactive sessions, win prizes and learn about mobile security in the process. Discover more by attending the Mobile Stream, which consists of 15 sessions designed to educate attendees about the most comprehensive security portfolio in the market.

More from Endpoint

Unified endpoint management for purpose-based devices

4 min read - As purpose-built devices become increasingly common, the challenges associated with their unique management and security needs are becoming clear. What are purpose-built devices? Most fall under the category of rugged IoT devices typically used outside of an office environment and which often run on a different operating system than typical office devices. Examples include ruggedized tablets and smartphones, handheld scanners and kiosks. Many different industries are utilizing purpose-built devices, including travel and transportation, retail, warehouse and distribution, manufacturing (including automotive)…

Virtual credit card fraud: An old scam reinvented

3 min read - In today's rapidly evolving financial landscape, as banks continue to broaden their range of services and embrace innovative technologies, they find themselves at the forefront of a dual-edged sword. While these advancements promise greater convenience and accessibility for customers, they also inadvertently expose the financial industry to an ever-shifting spectrum of emerging fraud trends. This delicate balance between new offerings and security controls is a key part of the modern banking challenges. In this blog, we explore such an example.…

Endpoint security in the cloud: What you need to know

9 min read - Cloud security is a buzzword in the world of technology these days — but not without good reason. Endpoint security is now one of the major concerns for businesses across the world. With ever-increasing incidents of data thefts and security breaches, it has become essential for companies to use efficient endpoint security for all their endpoints to prevent any loss of data. Security breaches can lead to billions of dollars worth of loss, not to mention the negative press in…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today